posted on 2012-03-16, 10:31authored byMahmood Niazi, Muhammad Ali Babar
Objective: In this paper, we present findings from an empirical study that was aimed at identifying the lative ‘‘perceived value” of CMMI level 2 specific practices based on the perceptions and experiences of practitioners of small and medium size companies. The objective of this study is to identify the extent
to which a particular CMMI practice is used in order to develop a finer-grained framework, which encompasses
the notion of perceived value within specific practices. Method: We used face-to-face questionnaire based survey sessions as the main approach to collecting
data from 46 software development practitioners from Malaysia and Vietnam. We asked practitioners to choose and rank CMMI level 2 practices against the five types of assessments (high, medium, low, zero
or do not know). From this, we have proposed the notion of ‘perceived value’ associated with each practice. Results: We have identified three ‘requirements management’ practices as having a ‘high perceived
value’. The results also reveal the similarities and differences in the perceptions of Malaysian and Vietnamese
practitioners with regard to the relative values of different practices of CMMI level 2 process areas. Conclusions: Small and medium size companies should not be seen as being ‘‘at fault” for not adopting CMMI – instead the Software Process Improvement (SPI) implementation approaches and its transition mechanisms should be improved. We argue that research into ‘‘tailoring” existing process capability maturity models may address some of the issues of small and medium size companies.
History
Publication
Information and Software Technology;51 (8) pp. 1231-1243
Publisher
Elsevier
Note
peer-reviewed
Other Funding information
SFI
Rights
This is the author’s version of a work that was accepted for publication in Information and Software Technology. Changes resulting from the publishing process, such as peer review, editing, corrections, structural formatting, and other quality control mechanisms may not be reflected in this document. Changes may have been made to this work since it was submitted for publication. A definitive version was subsequently Informationa and Software Technology 51(8) pp 1231-1243 dx.doi.org/10.1016/j.infsof.2009.03.001